Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Public key encryption uses two keys.

(True/False)
4.8/5
(36)

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

(True/False)
4.9/5
(25)

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.

(Multiple Choice)
4.9/5
(38)

Which of the following is not one of the main firewall screening techniques?

(Multiple Choice)
4.9/5
(37)

High-availability computing is also referred to as fault tolerance.

(True/False)
4.8/5
(35)

An independent computer program that copies itself from one computer to another over a network is called a

(Multiple Choice)
4.8/5
(33)

How can a firm's security policies contribute and relate to the six main business objectives? Give examples.

(Essay)
4.9/5
(40)

Which of the following statements about the Internet security is not true?

(Multiple Choice)
4.9/5
(34)

The HIPAA Act

(Multiple Choice)
4.9/5
(30)

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called

(Multiple Choice)
4.9/5
(36)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

(Short Answer)
4.8/5
(25)

Smaller firms may outsource some or many security functions to

(Multiple Choice)
4.9/5
(44)

You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.

(Essay)
4.8/5
(40)

Approximately how many new threats from malware were detected by Internet security firms in 2012?

(Multiple Choice)
4.8/5
(35)

Hackers create a botnet by

(Multiple Choice)
4.7/5
(31)

Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called

(Multiple Choice)
4.7/5
(39)

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

(Multiple Choice)
4.9/5
(40)

How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

(Essay)
4.8/5
(32)

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

(Multiple Choice)
4.8/5
(42)

Rigorous password systems

(Multiple Choice)
5.0/5
(39)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)